Cisco IOS XR Supported Platforms and Features

Total Page:16

File Type:pdf, Size:1020Kb

Cisco IOS XR Supported Platforms and Features R3.3 Beta Draft—Cisco Confidential Information Cisco IOS XR Supported Platforms and Features This document provides an overview of the platforms supported by the Cisco IOS XR Software Releases 2.0, 3.0, 3.2, and 3.3. Note You can find the most current Cisco IOS XR software documentation on the World Wide Web at: http://www.cisco.com/univercd/cc/td/doc/product/ioxsoft/index.htm These electronic documents may contain updates and modifications. See the “Obtaining Documentation” section on page 9 for more information on obtaining Cisco documentation. This document contains the following sections: • Introduction • Platforms • Supported Features Document Revision History The Document Revision History table records technical changes to this document. Table 1 shows the document revision number for the change, the date of the change, and a brief summary of the change. Note that not all Cisco documents use a Document Revision History Table. Table 1 Document Revision History Revision Date Change Summary OL-8505-01 February 2006 Initial release of this document. Documentation Objectives The Cisco IOS XR Supported Platforms and Features document describes various hardware and software components that compose the Cisco IOS XR system. Cisco IOS XR Supported Platforms and Features OL-8505-01 1 Cisco IOS XR Supported Platforms and Features Audience R3.3 Beta Draft—Cisco Confidential Information Audience This document is intended for users who design integrated routing systems that use Cisco IOS XR software. Introduction The Cisco IOS XR software is a distributed operating system designed for continuous system operation combined with service flexibility and speed. The following is a high-level overview of Cisco IOS XR software features and benefits: • IP and Routing—Supports a wide range of IPv4 and IPv6 services, and routing protocols; including Border Gateway Protocol (BGP), Intermediate System-to-Intermediate System (IS-IS), Open Shortest Path First (OSPF), IP Multicast, Routing Policy Language (RPL), and Hot Standby Router Protocol (HSRP)/Virtual Router Redundancy Protocol features (VRRP). • MPLS—Supports Multiprotocol Label Switching (MPLS) protocols such as Traffic Engineering (TE), Resource Reservation Protocol (RSVP), and Label Distribution Protocol (LDP). • Multicast—Provides comprehensive IP Multicast software including Source Specific Multicast (SSM) and Bidirectional Protocol Independent Multicast (BIDIR-PIM) support. • Quality of service (QoS)—Supports rich QoS mechanisms including classifying, policing, marking, queuing, and shaping. The operating system supports the Modular QoS CLI (MQC), a consistent API that is used to configure QoS features on Cisco routing platforms. • Manageability—Provides industry-standard management interfaces including modular command-line interface (CLI), Simple Network Management Protocol (SNMP), and native Extensible Markup Language (XML) interfaces. • Security—Provides comprehensive network security features including access control lists (ACLs), routing authentications, AAA/TACACS+, Secure Shell (SSH), SNMPv3, and leading Routing Policy Language (RPL) support. Control plane protections integrated into line card ASICs include Generalized TTL Security Mechanism (GTSM), RFC 3682, and dynamic control plane protection. • The Craft Works Interface (CWI)— A client-side application used to configure and manage Cisco routers. The management and configuration features include fault, configuration, security, and inventory, with an emphasis on speed and efficiency. The CWI provides a context-sensitive graphical representation of the objects in a Cisco router, simplifying the process of configuring and managing the router. The CWI allows you to log in to multiple routers and perform management tasks. • Partitioning into Secure Domain Router (SDR)—A logical router is a set of line cards and route processors (RPs) that form a complete router. More specifically, each SDR contains its own instance of dynamic routing, IP stack, SysDB (system database), interface manager, event notification system, and so on. • Availability—Supports rich availability features such as fault containment, fault tolerance, fast switchover, link aggregation, and nonstop forwarding (NSF). Cisco IOS XR Supported Platforms and Features 2 OL-8505-01 Cisco IOS XR Supported Platforms and Features Platforms R3.3 Beta Draft—Cisco Confidential Information • In Service Software Upgrade (ISSU)—Supports a modular-packaging-based release model to minimize impact of upgrades, and supports ISSU with NSF where possible. • Layer 3 Virtual Private Networks (L3VPN)—Supports multiple simultaneous Layer 3 VPN routing and forwarding (VRF) instances. See the Cisco IOS XR Release Notes for releases 2.0, 3.0, 3.2, and 3.3 for more details. The Release Notes for Cisco IOS XR software are located at the following URL: http://www.cisco.com/en/US/products/ps5845/prod_release_notes_list.html Platforms This section provides an overview of the following platforms supported by Cisco IOS XR software: • Cisco CRS-1 Router • Cisco XR 12000 Series Routers Table 2 lists the platforms supported by Cisco IOS XR software and in which release the platform was first supported. Table 2 Cisco IOS XR Software Supported Platforms Release 2.0 Release 3.0 Release 3.2 Release 3.3 Cisco CRS-1 16-Slot Line Card Chassis Yes Yes Yes Yes (LCC) Cisco CRS-1 8-Slot LCC Yes Yes Yes Cisco XR 12404 Yes Yes Cisco XR 12406 Yes Yes Cisco XR 12410 Yes Yes Cisco XR 12416 Yes Yes Cisco CRS-1 Router The Cisco CRS-1 is a highly scalable routing platform designed for efficient service provider point-of-presence (POP) evolution as the IP network grows into a multiservices network. The main features of all Cisco CRS-1 routing systems include: • A highly scalable service provider router with a capacity of 640 gigabits per second (Gbps) for a CRS-1 8-Slot Line Card Chassis (LCC) and 1.2 terabits per second (Tbps) for a CRS-1 16-Slot LCC of bandwidth. The Cisco CRS-1 is scalable to 92 Tbps capacity. • Supports expansion from single-chassis to multishelf systems. • A wide range of interface speeds and types (for example, OC-48 Packet-over-SONET/SDH (POS) and OC-192 POS), and a programmable MSC forwarding engine that provides full-featured forwarding at line-rate speeds. • Redundancy and reliability features allow nonstop operation even during service upgrades of equipment, with no single points of failure in hardware or software. Cisco IOS XR Supported Platforms and Features OL-8505-01 3 Cisco IOS XR Supported Platforms and Features Platforms R3.3 Beta Draft—Cisco Confidential Information The Cisco CRS-1 8-Slot LCC uses the same line cards, the same software, and the same type of midplane and switch mechanism as the Cisco CRS-1 16-Slot LCC. It provides the higher-speed interfaces found in the Cisco CRS-1 16-Slot LCC, but in a smaller platform, allowing easier deployment in locations where power, cooling, and other facilities might be hard to provision. The following sections provide an overview of the Cisco CRS-1 routing systems: • Cisco CRS-1 16-Slot Line Card Chassis (LCC) • Cisco CRS-1 8-Slot Line Card Chassis (LCC) Cisco CRS-1 16-Slot Line Card Chassis (LCC) The Cisco CRS-1 16-Slot LCC has 16 MSC slots, each with a capacity of 40 Gbps, for a total routing capacity per chassis of 1.2 terabits. The routing system is built around a scalable, distributed three-stage Benes switch fabric and a variety of data interfaces. The data interfaces are contained on physical layer interface modules (PLIMs) and SMDS interface protocol that mate with an associated MSC through the chassis midplane. The switch fabric cross-connects MSCs to each other. Cisco CRS-1 8-Slot Line Card Chassis (LCC) The Cisco CRS-1 8-Slot LCC has eight MSC slots, each with a capacity of 40 Gbps, for a total routing capacity for each chassis of 640 Gbps. The routing system is built around a scalable, distributed three-stage Benes switch fabric and a variety of data interfaces. The data interfaces are contained on PLIMs and SIPs that mate with an associated MSC through the chassis midplane. The switch fabric cross-connects MSCs to each other Cisco XR 12000 Series Routers Cisco XR 12000 Series Routers accelerate the service provider evolution toward IP Next Generation Networks, combining the unparalleled innovation of Cisco IOS XR software with the investment protection of the market-leading Cisco 12000 Series. Offering secure virtualization, continuous system operation, and multiservice scale, Cisco XR 12000 Series Routers provide intelligent routing solutions that scale from 2.5-Gbps to n x 10-Gbps capacity per slot (where n = the number of line cards) , enabling next-generation IP/MPLS networks. The Cisco XR 12000 Series Router is powered by Cisco IOS XR Software, which allows you to isolate public and private services through the virtualization of a single router into separate physical and logical partitions. Cisco IOS XR software is a unique self-healing and self-defending operating system designed for always-on operation while scaling capacity and adding new services or features. With distributed processing intelligence and robust quality-of-service and multicast mechanisms, the Cisco XR 12000 Series Router allows you to scale services and customers with performance. Built upon a foundation of investment protection, the Cisco XR 12000 Series Router provides fully upgradable, single-chassis platforms ranging from 2.5-Gbps to n x 10-Gbps capacity per slot. The following sections provide an overview of Cisco XR 12000 Series Routers: • Cisco XR 12404 • Cisco XR 12406 • Cisco XR 12410 • Cisco XR 12416 Cisco IOS XR Supported Platforms and Features 4 OL-8505-01 Cisco IOS XR Supported Platforms and Features Supported Features R3.3 Beta Draft—Cisco Confidential Information Cisco XR 12404 The Cisco XR 12404 Router is a 4-slot, 10-Gbps-per-slot chassis that delivers 80 Gbps of switching capacity in a small 1/8-rack form factor. Cisco XR 12406 The Cisco XR 12406 Router is a 6-slot, 10-Gbps-per-slot chassis that delivers 120 Gbps of switching capacity in a compact 1/4-rack form factor.
Recommended publications
  • Cisco Systems, Inc. 2015 Annual Report
    Cisco Systems, Inc. 2015 Annual Report Annual Report 2015 Letters to Shareholders To Our Shareholders, Fiscal 2015 was a great year for Cisco. As we marked A Winning Differentiated Strategy our thirtieth anniversary year, we witnessed the inflection point in the next wave of the Internet. This next wave will Our strong financial performance and our market leadership have five to ten times the impact of the first. As fifty billion in most areas clearly show that our vision and strategy are devices come online and connect over the next few years, working. Our differentiation comes from our ability to deliver the network and Cisco have never been more relevant or integrated architectures at scale, with speed and with more strategic. In our view, it is clear that the opportunities security. These architectures combine multiple industry- ahead are even brighter than those of our past. leading technologies, services, and software with unique go-to-market models and partnerships. We bring these At Cisco, we believe much of our success has come from architectures to market in solutions that deliver business our ability to lead market transitions. More than five years outcomes to our customers. In our view, this architectural ago, we saw the impact that connecting people, processes, approach allows us to deliver value greater than the sum data, and things would have on organizations and countries. of the parts and is enabling us to pull away from the Today, across the board, our customers’ top priority is to competition and gain wallet and market share. use technology to drive growth and productivity, manage risk, and gain competitive advantage.
    [Show full text]
  • Cisco IOS Netflow Configuration Guide, Release 12.2SR
    Cisco IOS NetFlow Configuration Guide Release 12.2SR Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Cisco IOS XR Software Release
    CISCO CRAFT WORKS INTERFACE QUICK START GUIDE Cisco IOS XR Software Release 3.5 1 Introduction 2 About CWI 3 Prerequisites 4 Configuring the Router and CWI Client 5 Installing, Launching, and Uninstalling CWI 6 Getting Started with CWI 7 Reference Information 8 Obtaining Documentation, Obtaining Support, and Security Guidelines 1 Introduction This document introduces Craft Works Interface (CWI) that supports Cisco IOS XR Software Release 3.5. Note This document refers to CWI managing devices. For Cisco IOS XR software, the devices can be any or all of the secure domain routers (SDRs) of which your Cisco IOS XR system is composed. Related Documentation See the following list for related documents that may be useful: • Cisco Craft Works Interface User Guide • Cisco Craft Works Interface Online Help Intended Audience This document is intended for experienced service provider administrators, Cisco telecommunication management engineers, and third-party field service technicians who have completed the required Cisco router training sessions. 2 About CWI CWI is a powerful, session-based tool that allows you to manage, monitor, and configure a single device or a network of devices. CWI is designed to operate in as many situations as possible. Using CWI you can: • Connect to the devices in several ways through a serial port, a terminal server, or an IP-based method, such as Telnet, SSH, or CORBA. • Run Windows, Macintosh, and Linux clients. • Connect to devices with or without XML or command-line interface (CLI) capabilities. • Display both the administrative (admin) plane and device plane for Cisco IOS XR devices. CWI offers a selection of CLI- and graphic-based tools from which you can perform management tasks.
    [Show full text]
  • Cisco CRS-1 SIP and SPA Configuration Guide Cisco IOS XR Software Release 3.3
    R3.3 Beta Draft—Cisco Confidential Information Cisco CRS-1 SIP and SPA Configuration Guide Cisco IOS XR Software Release 3.3 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100 Text Part Number: OL-7110-03 R3.3 Beta Draft—Cisco Confidential Information THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
    [Show full text]
  • Cisco IOS XR Memory Forensics Analysis
    Cisco IOS XR memory forensics analysis Solal Jacob Agence Nationale de la Sécurité des Systèmes d’Information 2019 TOC I I- IOS XR internals & forensics analysis I II - Attack simulation I III - Detection ANSSI Cisco IOS XR memory forensics analysis 2/33 I- IOS XR internals & forensics analysis I We would like to be able to analyze a router to know if it was compromised I For that we want to develop memory forensics tools to detect advanced attack I IOS XR is an exotic system used on core routers ANSSI Cisco IOS XR memory forensics analysis 3/33 IOS XR I Used in Cisco routers (12000, ASR9000, ...) I 32 bits version only I Based on QNX 6.4 ANSSI Cisco IOS XR memory forensics analysis 4/33 QNX I Microkernel released in 1982, now part of Blackberry I Used in embedded system : Routers, Infotainment, Telematics (Westing House, AECL, Air traffic Control, General Electric) I Source was released then closed again ANSSI Cisco IOS XR memory forensics analysis 5/33 QNX architecture I Fault tolerant I Reduced kernel attack surface I Conforms to posix standard I Customizable by OEM ANSSI Cisco IOS XR memory forensics analysis 6/33 QNX Security & Forensics I Some CVEs I No hardening before 6.6 I Troopers 2016, QNX : ”99 Problems but a Microkernel ain’t one !” (Vuln in message passing & IPC) I Recon 2018, ”Dissecting QNX” (Mitigation & PRNG) I No forensics papers or presentations ANSSI Cisco IOS XR memory forensics analysis 7/33 QNX startup I The IPL, Inital Program Loader, initializes the hardware, configures the memory controller, loads the system image
    [Show full text]
  • System Management Configuration Guide for Cisco NCS 540 Series Routers, IOS XR Release 7.3.X
    System Management Configuration Guide for Cisco NCS 540 Series Routers, IOS XR Release 7.3.x First Published: 2021-02-26 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • IOS XR Software CRS-1 and C12000
    IOS XR Software CRS-1 and C12000 Martin Winter Technical Leader Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1 Agenda High Level IOS XR Strategy IOS XR Software Architecture IOS XR CLI Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2 High level IOS XR Strategy Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3 High End Routing Portfolio Next Generation Core 40G Routing Day 1 CRS-1 Multi-Chassis Scale Foundation for Core Consolidation Next Generation Core & Edge • Builds on 12000 Series Technology • PRP, 2.5G ISE, 10G ISE Cisco XR 12000 • Edge interface breadth/density • 4/6/10/16 Slot Form Factor • Foundation for Multi-Service Edge consolidation Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4 Cisco High End Routing Strategy IOS XR: Foundation of Cisco HER Technology Convergence HighHigh EndEnd RoutingRouting PlatformsPlatforms Systems Silicon Services (Single and Multi- (Forwarding (High Touch Deep Chassis / 2.5G to 40G+) Engines) Packet Inspection) Services CRS 40G ISE Blade (X-Blade) 12000 10G ISE 2.5G ISE vFW, SBC IOS XR Software • IOS XR is the ‘glue’, delivering HA, scale, core+edge services with common management and user interface Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5 IOS XR Software Architecture Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6 Modular IOS != IOS XR Modular IOS: Ships today on Catalyst 6500 with Sup720 and Sup32 Based on the same IOS code with added Microkernel and IOS split into multiple processes. Not everything as it’s own process (ie all Routing as one process), optimized for performance on existing hardware IOS XR: Ships today on CRS-1 and C12000 (PRP only) Complete rewrite of the code Very modular, split into multiple processes and built for multiterabit scaling and distributed operation Features targeted for SP NGN router Presentation_ID © 2006 Cisco Systems, Inc.
    [Show full text]
  • Cisco IOS Netflow Command Reference Full Book
    Cisco IOS NetFlow Command Reference July 2011 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Cisco IOS XR Security
    07_1587052717_ch06.qxp 5/15/09 11:21 AM Page 159 CHAPTER 6 Cisco IOS XR Security It is important to control access to the router to prevent unauthorized or malicious use that might take the router offline or use it to launch an attack on the rest of the network. Cisco IOS XR provides the authentication, authorization, and accounting (AAA) frame- work that helps provide secure access via the logical vty and the physical tty ports. Fur- thermore, ensuing sections in this chapter discuss the concepts of task-based authorization and familiarize the user with IOS XR concepts such as admin and SDR planes as well as the uniqueness of user groups and task group configuration. Forwarding plane refers to the components involved in the various stages during packet forwarding. Forwarding plane refers not only to the flow of a packet through the router but also to the packets destined to the router. Protection of forwarding plane is important and necessitates controlling the type of traffic that traverses the router, and limiting the amount of traffic that’s destined to the router itself so that the router does not become a victim of a denial of service (DoS) attack. You might well be familiar with access control lists (ACL) and Unicast Reverse Path Forwarding (uRPF) as popular forwarding plane secu- rity features. Additionally, IOS XR has a concept of Local Packet Transport Service (LPTS). LPTS provides protection against traffic destined to the router. This type of traffic is usually related to routing protocols that typically run on the route processor (RP) of the router, though Telnet, SNMP, NTP, ping, traceroute, and various other services create traf- fic that can be destined to a router’s line card or RP CPU.
    [Show full text]
  • Release Notes for Cisco NCS 5000 Series Routers, IOS XR Release 6.6.1
    Release Notes for Cisco NCS 5000 Series Routers, IOS XR Release 6.6.1 Network Convergence System 5000 Series Routers 2 Release 6.6.1 Packages 2 System Requirement 3 Software Features Introduced in this Release 4 Behavior Change Introduced in this release 4 Hardware Features Introduced in this Release 4 Caveats 5 Upgrading Cisco IOS XR Software 5 Related Documentation 5 Communications, Services, and Additional Information 6 Full Cisco Trademarks with Software License 8 Network Convergence System 5000 Series Routers Note Explore the Content Hub, the all new portal that offers an enhanced product documentation experience. • Use faceted search to locate content that is most relevant to you. • Create customized PDFs for ready reference. • Benefit from context-based recommendations. Get started with the Content Hub at content.cisco.com to craft a personalized documentation experience. Do provide feedback about your experience with the Content Hub. Cisco IOS XR Release 6.6.1 is a limited availability (LA) release. All Cisco IOS XR Release 6.6.1 features are available in Cisco IOS XR Release 6.6.25, which is a general availability (GA) release. For more information on IOS XR Release 6.6.25, see Release Notes for Cisco NCS 5500 Series Routers, Release 6.6.25 The Network Convergence System 5000 Series offers a high-density, small-form-factor MPLS aggregation router for metro aggregation. It is designed to economically scale large enterprise, over-the-top (OTT), and service provider Data Center networking architectures. The Cisco NCS 5000 Series is an extension to Cisco’s routing platform portfolio enabling Service Providers and MPLS enabled data center architectures to offer elastic networks with improved business agility and simplified operations to deliver high-bandwidth mobile, video, and cloud services.
    [Show full text]
  • Memory Forensics Analysis of Cisco IOS XR 32 Bits Routers
    Memory forensics analysis of Cisco IOS XR 32 bits routers Abstract Attackers are constantly developing new techniques to bypass current security measures, and they are researching new targets to attack. The "Shadow Brokers" case illustrates that advanced attackers now target network devices such as routers. These core devices handle large amounts of data and are generally not audited by the security team, nor protected by specific security solutions, making them very interesting targets for attackers. This paper explains Cisco IOS XR routers internal, relevant to forensics analysis. As no forensics tool exists on this platform, we develop a tool for dumping the memory of the routers and another one, amnesic-sherpa, to analyze the memory dumps. Also, we demonstrate that by using an automated process based on these tools, we can determine if a router was compromised. Keywords: Forensics, QNX, Cisco, Routers forensics, Memory forensics, Routers, Firmware analysis 1. Foreword help debug, ...). This process creates child processes (in user space) and manage the system memory. QNX can There are a lot of publications on Cisco routers us- thus via proc-nto load the services that the system needs. ing the standard version of IOS (Lindner, 2008). There These services use a message passing system (QNX, 2010c) are, however, very few technical papers and research work to communicate together. They are either provided by de- about the security and forensics analysis of Cisco router fault, or developed and distributed in a specific image of using IOS XR (CISCO, 2005). Furthermore these devices the system. are at the core of many networks today.
    [Show full text]
  • System Setup and Software Installation Guide for Cisco ASR 9000 Series Routers, IOS XR Release 6.7.X
    System Setup and Software Installation Guide for Cisco ASR 9000 Series Routers, IOS XR Release 6.7.x First Published: 2020-08-01 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]